Access Manager

This aims to join the dots between Identity Manager Role(s) and Access Manager Role(s) in a dynamic way. Firstly, we need to create a new custom shared attribute. The nrfMemberOf attribute holds all the currently active/assigned IDM Roles, whether they be Parent, Child or Group Roles. Next, we need to create a Virtual Attribute to…

+ read more

ScorpionSting
Feb 14, 2018
1:31 pm
Reads:
208
Score:
5

NAM Identity Provider authenticates the user based on configured contract, method and authentication class. NAM authentication classes are deployed in IDP servers and running as server-side code. If you would like to update user’s profile or execute some business logic (post-processing) without stopping or delaying regular login process, follow this solution to create…

Koushik Halder
Jan 17, 2018
7:01 am
Reads:
320
Score:
5

The Resource Owner Flow is one of the modes in the OAuth protocol. In this flow, a user can authenticate using the IDP contract that uses form-based authentication. Sometime during client application development, the application expects more than…

By: VNeeraj
Dec 4, 2017
9:16 am
Reads:
534
Score:
Unrated

NetIQ Access Manager is a comprehensive Web Access Management solution to secure web resources across cloud, mobile and enterprise. It supports different federation protocols including SAML, WS-Fed, WS-Trust etc. SimpleSAMLphp is a simple application written in native PHP that deals with authentication. SimpleSAMLphp also supports several federation protocols, authentication mechanisms and can be used…

Nov 17, 2017
9:00 am
Reads:
801
Score:
Unrated

This cool solution will provide directions on how to configure NetIQ Access Manager Single Sign-on using Azure Active Directory as your identity provider. To do this configuration you need a Microsoft Azure Active Directory account…

By: cstumula
Oct 23, 2017
2:14 pm
Reads:
831
Score:
4

Akamai Enterprise Application Access (EAA) is a hybrid (cloud and on-premise) solution that shifts the attack surface of a DMZ in a secure cloud bastion. The whole idea is to control and secure access without any distinction between internal…

By: civ75
Oct 20, 2017
2:19 pm
Reads:
878
Score:
Unrated

Koushik Halder shares a step-by-step process for creating a custom authentication class and how to perform authentication and authorization together. The class will also return authentication or authorization errors to the login form…

Koushik Halder
Oct 13, 2017
12:38 pm
Reads:
911
Score:
5

Geolocation dashboard shows a map with the number of logged in users in a specific geographical location. This solution will demonstrate how to use Maxmind Geolocation Provider with Analytics.

Koushik Halder
Oct 6, 2017
10:35 am
Reads:
937
Score:
5

Authorization policies are used when you want to protect a resource based on criteria other than authentication and you want Access Manager to enforce the access restrictions. Authorization policies are enforced when a user requests data from a resource…

Koushik Halder
Sep 20, 2017
8:41 am
Reads:
585
Score:
5

There is no shortage of opinions about the dynamics of hybrid cloud growth and its effect on IT organizations. As such, I found CRN’s 2017 purchasing survey to be a worthwhile snapshot of priorities placed in front of today’s CIO’s and where they are investing the most in. You’ll notice in the survey that 3…

+ read more

Kent Purdy
Sep 14, 2017
8:35 am
Reads:
742
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow